Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing
نویسندگان
چکیده
منابع مشابه
Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملAn Architecture Based on Danger Theory in Immune Systems and Mobile Agents for Distributed Intrusion Detection
* We propose an artificial immune model for intrusion detection in distributed systems based on a relatively recent theory in immunology called Danger theory. Based on Danger theory, immune response in natural systems is a result of sensing corruption as well as sensing unknown substances. In contrast, traditional self-nonself discrimination theory states that immune response is only initiated ...
متن کاملmOSAIC-Based Intrusion Detection Framework for Cloud Computing
In recent years, with the growing popularity of Cloud Computing, security in Cloud has become an important issue. Cloud Computing paradigm represents an opportunity for users to reduce costs and increase efficiency providing an alternative way of using services. It represents both a technology for using computing infrastructures in a more efficient way and a business model for selling computing...
متن کاملHybrid Intrusion Detection Architecture for Cloud Environment
The Cloud computing system can be easily threatened by various attacks, because most of the cloud computing systems provide service to so many people who are not proven to be trustworthy. Due to their distributed nature, cloud computing environment are easy targets for intruders[1]. Intrusions have been a major problem in terms of computing resources such as grid computing, ubiquitous computing...
متن کاملComparative Study of Intrusion Detection Systems in Cloud Computing
Cloud Computing have the capability to avoid wastage of resources, reduction of cost, flexibility, ease of service and mobility. This has resulted in the widespread prevalence of this service. Cloud Environment is distributed in nature. Thus, they are easy targets of the intruders. Intrusion Detection System is an appropriate system for detection and prevention of intrusions. There are various ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer and Communication Engineering
سال: 2013
ISSN: 2010-3743
DOI: 10.7763/ijcce.2013.v2.267